物联网学报 ›› 2018, Vol. 2 ›› Issue (3): 71-81.doi: 10.11959/j.issn.2096-3750.2018.00066
所属专题: 区块链
王宗慧1,张胜利1,金石2,王晖1
修回日期:
2018-05-25
出版日期:
2018-09-01
发布日期:
2018-10-15
作者简介:
王宗慧(1994-),女,深圳大学硕士生,主要研究方向为区块链、区块链数据隐私保护技术等。|张胜利(1978-),男,博士,深圳大学教授、博士生导师、物理层网络编码创始人,主要研究方向为无线网络、区块链关键技术、物理层网络编码等。|金石(1974-),男,博士,东南大学教授、博士生导师、国家杰出青年基金获得者,主要研究方向为 5G/B5G 移动通信理论与关键技术研究、物联网理论与关键技术研究以及机器学习与大数据处理在移动通信中的应用等。|王晖(1969-),男,博士,深圳大学教授、博士生导师,主要研究方向为物联网、无线网络等。
基金资助:
Zonghui WANG1,Shengli ZHANG1,Shi JIN2,Hui WANG1
Revised:
2018-05-25
Online:
2018-09-01
Published:
2018-10-15
Supported by:
摘要:
区块链是一种具有去中心化、安全可信、防篡改和可编程等特点的分布式账本技术。区块链系统的公开透明特性使用户交易隐私受到严重威胁,针对此问题设计了不同应用场景相应的隐私问题解决方案。首先介绍区块链技术且基本工作原理,并介绍区块链中典型的隐私问题,如交易隐私问题和账户隐私问题;其次,将现有典型的区块链隐私保护方案分为3种,即混币方案、密码学方案和安全通道方案,并对这3种区块链隐私保护技术方案进行综合而全面的介绍;最后,对区块链数据隐私保护技术进行分析并展望其在物联网安全领域的应用与发展。
中图分类号:
王宗慧,张胜利,金石,王晖. 区块链数据隐私保护研究[J]. 物联网学报, 2018, 2(3): 71-81.
Zonghui WANG,Shengli ZHANG,Shi JIN,Hui WANG. Survey on privacy preserving techniques for blockchain[J]. Chinese Journal on Internet of Things, 2018, 2(3): 71-81.
表1
现有混币技术特点对比"
方法 | 结构 | 特点 | 盗窃风险 | 拒绝服务 |
MixCoin | 中心化 | 匿名性取决于第三方混币服务与可信度提供用户 | 高 | 低 |
BlindCoin | 中心化 | 匿名性取决于第三方混币服务及盲签名技术 | 高 | 低 |
Dash | 中心化 | 选取几个主节点提供一连串混币服务,保证匿名性 | 中 | 低 |
CoinJoin | 中心化 | 使用多重签名技术来增强匿名性 | 低 | 高 |
CoinShuffle | P2P | 使用其他用户密钥加密用户输出地址,增加地址不可链接性 | 低 | 高 |
TumbleBit | P2P | 使用RSA和ECDSA密码学技术,由不可信第三方实现混币 | 低 | 低 |
CoinParty | P2P | 基于解密混合网络和阈值签名的混币服务 | 低 | 低 |
表3
现有安全通道技术特性对比"
方法 | 特点 | 优点 | 缺点 |
Bi-directional Payment | 链下交易通道实现快速交易 | 交易内容仅交易双方可见,减少验证时间 | 公布用户最后的交易状态 |
Lightning Network | 链下交易通道实现快速交易 | 交易内容仅交易双方可见,减少验证时间 | 依靠第三方平台,公布最后交易状态 |
Sprites | 交易处理速度快 | 支持部分提款和存款 | 交易可链接 |
Blot | 对交易内容加密,不可信第三方实现链下通道交易 | 提供更强的用户隐私,交易不可链接 | 第三方可能获取交易内容 |
TumbleBit | 通过RSA和ECDSA密码学实现匿名的链下通道交易技术 | 第三方无法获取具体交易信息,保证用户隐私安全 | 验证时间较长 |
[1] | 袁勇, 王飞跃 . 区块链技术发展现状与展望[J]. 自动化学报, 2016,42(4): 481-494. |
[2] | SWAN M . Blockchain:blueprint for a new economy[M]. “O’Reilly Media,Inc.”, 2015: 212-235. |
[3] | ZHENG Z , XIE S , DAI H N ,et al. Blockchain challenges and opportunities:a survey[J]. International Journal of Web & Grid Services, 2016: 1-19. |
[4] | CROSBY M , PATTANAYAK P , VERMA S ,et al. Blockchain technology:beyond bitcoin[J]. Applied Innovation, 2016,2: 6-10. |
[5] | RON D , SHAMIR A . Quantitative analysis of the full bitcoin transaction graph[C]// Interna-tional Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2013: 6-24. |
[6] | BAYARDO R J , AGRAWAL R . Data privacy through optimal k-anonymization[C]// Proceedings.21st International Conference on Data Engineering,2005,ICDE 2005. 2005: 217-228. |
[7] | GENTRY C . A fully homomorphic encryption scheme[M]. Stanford University, 2009: 112-130. |
[8] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Consulted, 2008 |
[9] | DONET J A D , PéREZ-SOLA C , HERRERA-JOANCOMARTí J , . The bitcoin P2P network[C]// Intern-ational Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2014: 87-102. |
[10] | ANTONOPOULOS A M . Mastering bitcoin:unlocking digital crypto-currencies[M]. O'Reilly Media,Inc. 2014: 25-36. |
[11] | JOHNSON D , MENEZES A , VANSTONE S . The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001,1(1): 36-63. |
[12] | COURTOIS N T , GRAJEK M , NAIK R . Optimizing sha256 in bitcoin mining[C]// International Conference on Cryptography and Security Systems. Springer,Berlin,Heidelberg, 2014: 131-144. |
[13] | CASTRO M , LISKOV B . Practical Byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems (TOCS), 2002,20(4): 398-461. |
[14] | KING S , NADAL S . Ppcoin:peer-to-peer crypto-currency with proof-of-stake[J]. Self-published Paper, 2012(8):19. |
[15] | ONGARO D , OUSTERHOUT J K . In search of an understandable consensus algorithm[C]// USENIX Annual Technical Conference. 2014: 305-319. |
[16] | REID F , HARRIGAN M . An analysis of anonymity in the bitcoin system[M]. Security and Privacy in Social Networks. Springer,New York,NY, 2013: 197-223. |
[17] | GOLDFEDER S , KALODNER H , REISMAN D ,et al. When the cookie meets the blockchain:privacy risks of Web payments via cryptocurrencies[J]. 2017: 1-23. |
[18] | MEIKLEJOHN S , POMAROLE M , JORDAN G ,et al. A fistful of bitcoins:characterizing pay-ments among men with no names[C]// Proceedings of the 2013 Conference on Internet Measurement Conference. ACM, 2013: 127-140. |
[19] | RON D , SHAMIR A . Quantitative analysis of the full bitcoin transaction graph[C]// Intern-ational Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2013: 6-24. |
[20] | KOSHY P , KOSHY D , MCDANIEL P . An analysis of anonymity in bitcoin using P2P network traffic[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2014: 469-485. |
[21] | ANDROULAKI E , KARAME G O , ROESCHLIN M ,et al. Evaluating user privacy in bitcoin[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2013: 34-51. |
[22] | OBER M , KATZENBEISSER S , HAMACHER K . Structure and anonymity of the bitcoin transaction graph[J]. Future Internet, 2013,5(2): 237-250. |
[23] | BONNEAU J , NARAYANAN A , MILLER A ,et al. Mixcoin:anonymity for bitcoin with accountable mixes[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2014: 486-504. |
[24] | VALENTA L , ROWAN B . Blindcoin:blinded,accountable mixes for bitcoin[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2015: 112-126. |
[25] | CHAUM D , . Blind signatures for untraceable payments[C]// Advances in Cryptology. Springer,Boston,MA, 1983: 199-203. |
[26] | DUFFIELD E , DIAZ D . Dash:a privacy centric crypto currency[J]. 2014: 1-22. |
[27] | Maxwell , Gregory . CoinJoin:bitcoin privacy for the real world[J]. 2013: 1-13. |
[28] | RUFFING T , MORENO-SANCHEZ P , KATE A . CoinShuffle:practical decentralized coin mixing for Bitcoin[C]// European Symposium on Research in Computer Security. Springer,Cham, 2014: 345-364. |
[29] | HEILMAN E , ALSHENIBR L , BALDIMTSI F ,et al. TumbleBit:an untrusted bitcoin-compatibl-e anonymous payment hub[C]// Proceedings of NDSS 2017, 2017: 1-15. |
[30] | ZIEGELDORF J H , GROSSMANN F , HENZE M ,et al. CoinParty:secure multi-party mixing of bitcoins[C]// Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. ACM, 2015: 75-86. |
[31] | Van Saberhagen N.Cryptonote v2.0[J]. 2013: 1-13. |
[32] | NOETHER S , MACKENZIE A , TEAM M C . Ring confidential transactions[J]. 2016: 1-12. |
[33] | MILLER A , MOESER M , LEE K ,et al. An empirical analysis of linkability in the monero blockchain[J]. 2017: 1-15. |
[34] | KUMAR A , FISCHER C , TOPLE S ,et al. A traceability analysis of monero’s blockchain[C]// European Symposium on Research in Computer Security. Springer,Cham, 2017: 153-173. |
[35] | MIERS I , GARMAN C , GREEN M ,et al. Zerocoin:anonymous distributed e-cash from bitcoin[C]// 2013 IEEE Symposium on Security and Privacy (SP). 2013: 397-411. |
[36] | RACKOFF C , SIMON D R . Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack[C]// Annual International Cryptology Conference. Springer,Berlin,Heidelberg, 1991: 433-444. |
[37] | SASSON E B , CHIESA A , GARMAN C ,et al. Zerocash:decentralized anonymous payment-s from bitcoin[C]// 2014 IEEE Symposium on Security and Privacy (SP). 2014: 459-474. |
[38] | MCCORRY P , M?SER M , SHAHANDASTI S F , ,et al. Towards bitcoin payment networks[C]// Australasian Conference on Information Security and Privacy. Springer,Cham, 2016: 57-76. |
[39] | DECKER C , WATTENHOFER R . A fast and scalable payment network with bitcoin duplex micropayment channels[C]// Symposium on Self-Stabilizing Systems. Springer,Cham, 2015: 3-18. |
[40] | POON J , DRYJA T . The bitcoin lightning network:scalable off-chain instant payments[J]. Draft Version 0.5, 2016,9:14. |
[41] | MILLER A , BENTOV I , KUMARESAN R ,et al. Sprites:payment channels that go faster than lightning[J]. 2017: 1-23. |
[42] | GREEN M , MIERS I . Bolt:anonymous payment channels for decentralized currencies[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017: 473-489. |
[43] | HEILMAN E , BALDIMTSI F , GOLDBERG S . Blindly signed contracts:anonymous on-blockchain and off-blockchain bitcoin transactions[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2016: 43-60. |
[44] | ZHANG Y , WEN J . The IoT electric business model:using blockchain technology for the Internet of things[J]. Peer-to-Peer Networking and Applications, 2017,10(4): 983-994. |
[45] | CHAKRAVORTY A , WLODARCZYK T , RONG C . Privacy preserving data analytics for smart homes[C]// Security and Privacy Workshops (SPW),2013 IEEE. IEEE, 2013: 23-27. |
[46] | DORRI A , KANHERE S S , JURDAK R ,et al. Blockchain for IoT security and privacy:the case study of a smart home[C]// 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerC-om Workshops). 2017: 618-623. |
[1] | 吴靖, 李晟, 张景, 辛明, 陶若文, 周舟, 潘力佳, 施毅. 面向物联网的新型柔性传感器[J]. 物联网学报, 2023, 7(2): 1-14. |
[2] | 梁峻阁, 宋怡然, 孙杨帆, 计樱莹, 潘力佳, 施毅. 基于可穿戴与可植入技术的人体健康物联网研究进展[J]. 物联网学报, 2023, 7(2): 26-34. |
[3] | 耿光磊, 高博, 熊轲, 樊平毅, 陆杨, 王煜炜. 联邦学习赋能6G网络综述[J]. 物联网学报, 2023, 7(2): 50-66. |
[4] | 卫浓钰, 江子龙, 陈芳炯. 基于位置信息和能量均衡的声电协同网络AODV[J]. 物联网学报, 2023, 7(1): 27-36. |
[5] | 申滨, 李银波, 梁枭伟. 基于增强加权质心定位的认知物联网用户频谱接入控制[J]. 物联网学报, 2023, 7(1): 93-108. |
[6] | 蒋伟进, 周文颖, 李恩, 罗田甜, 杨莹. 基于区块链技术的云制造服务架构及共识算法研究[J]. 物联网学报, 2023, 7(1): 159-173. |
[7] | 汪静, 何乐生, 李忠红, 李路迟, 杨航. 物联网轻量级认证加密算法ASCON的软硬件协同设计[J]. 物联网学报, 2022, 6(4): 139-148. |
[8] | 蒋伟进, 罗田甜, 杨莹, 李恩, 周文颖. 物联网环境下基于区块链技术的私有数据访问控制模型[J]. 物联网学报, 2022, 6(4): 169-182. |
[9] | 邢方圆, 贺诗波, 孙铭阳, 陈积明. 基于“云-管-边-端”物联网架构的碳排放监测[J]. 物联网学报, 2022, 6(4): 53-64. |
[10] | 沈传年. 区块链跨链技术研究综述[J]. 物联网学报, 2022, 6(4): 183-196. |
[11] | 张在琛, 尤肖虎, 党建, 吴亮, 朱秉诚, 陈绩, 汪磊. 无线光通信与物联网[J]. 物联网学报, 2022, 6(3): 1-13. |
[12] | 黄诺, 刘伟杰, 龚晨. 面向工业物联网的拍赫兹通信[J]. 物联网学报, 2022, 6(3): 37-46. |
[13] | 孙君, 赵尚维康. 工业物联网中基于Sarsa算法的节能计算卸载方案[J]. 物联网学报, 2022, 6(3): 82-90. |
[14] | 刘杨, 李崔灿, 彭木根. 低功耗水下物联网:愿景与关键技术[J]. 物联网学报, 2022, 6(2): 1-9. |
[15] | 杨靖, 谢金凤, 陈怡. 我国智慧城市场景中物联网终端评测与认证体系研究[J]. 物联网学报, 2022, 6(2): 26-37. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|